2 * Copyright (c) 2015, 2020 The FreeBSD Foundation
4 * This software was developed by Konstantin Belousov <kib@FreeBSD.org>
5 * under sponsorship from the FreeBSD Foundation.
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
16 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
17 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
20 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 #include <sys/param.h>
31 #include <sys/sysctl.h>
44 #include <machine/vmparam.h>
46 static int scratch_file;
49 copyin_checker(uintptr_t uaddr, size_t len)
53 ret = write(scratch_file, (const void *)uaddr, len);
54 return (ret == -1 ? errno : 0);
57 #if __SIZEOF_POINTER__ == 8
59 * A slightly more direct path to calling copyin(), but without the ability
60 * to specify a length.
63 copyin_checker2(uintptr_t uaddr)
67 ret = fcntl(scratch_file, F_GETLK, (const void *)uaddr);
68 return (ret == -1 ? errno : 0);
73 get_vm_layout(struct kinfo_vm_layout *kvm)
80 mib[2] = KERN_PROC_VM_LAYOUT;
84 return (sysctl(mib, nitems(mib), kvm, &len, NULL, 0));
87 #define FMAX ULONG_MAX
88 #if __SIZEOF_POINTER__ == 8
90 #define ADDR_SIGNED 0x800000c000000000
93 ATF_TC_WITHOUT_HEAD(kern_copyin);
94 ATF_TC_BODY(kern_copyin, tc)
96 char template[] = "copyin.XXXXXX";
97 struct kinfo_vm_layout kvm;
105 error = get_vm_layout(&kvm);
106 ATF_REQUIRE(error == 0);
108 page_size = sysconf(_SC_PAGESIZE);
109 ATF_REQUIRE(page_size != (long)-1);
111 maxuser = kvm.kvm_max_user_addr;
112 scratch_file = mkstemp(template);
113 ATF_REQUIRE(scratch_file != -1);
117 * Since the shared page address can be randomized we need to make
118 * sure that something is mapped at the top of the user address space.
119 * Otherwise reading bytes from maxuser-X will fail rendering this test
122 if (kvm.kvm_shp_addr + kvm.kvm_shp_size < maxuser) {
123 addr = mmap((void *)(maxuser - page_size), page_size, PROT_READ,
124 MAP_ANON | MAP_FIXED, -1, 0);
125 ATF_REQUIRE(addr != MAP_FAILED);
128 ATF_CHECK(copyin_checker(0, 0) == 0);
129 ATF_CHECK(copyin_checker(maxuser - 10, 9) == 0);
130 ATF_CHECK(copyin_checker(maxuser - 10, 10) == 0);
131 ATF_CHECK(copyin_checker(maxuser - 10, 11) == EFAULT);
132 ATF_CHECK(copyin_checker(maxuser - 1, 1) == 0);
133 ATF_CHECK(copyin_checker(maxuser, 0) == 0);
134 ATF_CHECK(copyin_checker(maxuser, 1) == EFAULT);
135 ATF_CHECK(copyin_checker(maxuser, 2) == EFAULT);
136 ATF_CHECK(copyin_checker(maxuser + 1, 0) == 0);
137 ATF_CHECK(copyin_checker(maxuser + 1, 2) == EFAULT);
138 ATF_CHECK(copyin_checker(FMAX - 10, 9) == EFAULT);
139 ATF_CHECK(copyin_checker(FMAX - 10, 10) == EFAULT);
140 ATF_CHECK(copyin_checker(FMAX - 10, 11) == EFAULT);
141 #if __SIZEOF_POINTER__ == 8
142 ATF_CHECK(copyin_checker(ADDR_SIGNED, 1) == EFAULT);
143 ATF_CHECK(copyin_checker2(ADDR_SIGNED) == EFAULT);
146 if (addr != MAP_FAILED)
147 munmap(addr, PAGE_SIZE);
153 ATF_TP_ADD_TC(tp, kern_copyin);
154 return (atf_no_error());